On the attack-and-fault tolerance of intrusion detection systems in wireless mesh networks

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion detection in Wireless Mesh Networks (WMN) has recently emerged as an important research area. The diversity in WMN hardware and applications has generated extremely diverse network types, with diverse resource levels and system and threat models. Consequently, a variety of intrusion detection systems (IDS) have been proposed by the research community, each applicable to a specific type of WMN. Although the design and implementation of specific intrusion detection mechanisms have received considerable attention, little effort has been dedicated to the attack-and-fault tolerance of IDS themselves. In this paper we propose a taxonomy that categorizes state-of-the-art IDS solutions in WMN and we investigate the attack-and-fault tolerance of IDS in this taxonomy. We first survey a series of administrative mechanisms for attack-and-fault tolerant (AFT) IDS design. Then we propose modified designs for state-of-the-art IDS solutions that are AFT. Finally, through extensive simulations, we evaluate and compare AFT designed IDS with their original designs, with respect to the IDS performance and costs. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Hassanzadeh, A., & Stoleru, R. (2014). On the attack-and-fault tolerance of intrusion detection systems in wireless mesh networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8487 LNCS, pp. 387–401). Springer Verlag. https://doi.org/10.1007/978-3-319-07425-2_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free